Skip navigation
Search
Sciety application settings
Home
Groups
Explore
Newsletter
About
Log In
Sign Up
WITHDRAWN
Read the full article
See related articles
Discuss this preprint
Start a discussion
What are Sciety discussions?
Listed in
This article is not in any list yet, why not save it to one of your lists.
Log in to save this article
Abstract
No abstract available
Article activity feed
Version published to 10.31219/osf.io/ux9ge on OSF Preprints
Dec 5, 2024
Related articles
Phishing Attack Detection and Secure Data Transfer Using Echo State Networks and Federated Identity Management
This article has 2 authors:
Khalil El Hindi
Mohammed A. El-Meligy
Beaconing Detection in Encrypted Traffic: A SCADA-Based Hybrid Approach Using Zeek Metadata and Isolation Forest
This article has 5 authors:
Mustafa Tahsin Yilmaz
Ferdi Doğan
Esra Söğüt
Enes Algül
Çağla Aksoy
Safe Blood-IoT: A Secure and Intelligent Anomaly Detection Framework for Cold-Chain Preservation
This article has 2 authors:
P Pal
R Bhattacharya
Site navigation links
Home
Groups
Explore
Newsletter
About
Log In
Sign Up